Description
Dotclear 2.29 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload process by crafting a PHP shell with a command execution form to gain system access through the uploaded file.
Problem types
CWE-434: Unrestricted Upload of File with Dangerous Type
Product status
2.29
Credits
Ahmet Ümit BAYRAM
References
github.com/dotclear/dotclear/archive/refs/heads/master.zip
www.exploit-db.com/exploits/52037 (ExploitDB-52037)
git.dotclear.org/explore/repos (Vendor Homepage)
github.com/dotclear/dotclear/archive/refs/heads/master.zip (Software Link)
www.vulncheck.com/...execution-via-authenticated-file-upload (VulnCheck Advisory: Dotclear 2.29 Remote Code Execution via Authenticated File Upload)